The world of digital defense is constantly evolving, and understanding how malicious actors attempt to penetrate systems is critical. Hackers employ a range of techniques, from sophisticated exploits targeting vulnerabilities in software to simpler social engineering schemes. This investigates some frequent methods used, including phishing attacks